[Boards: 3 / a / aco / adv / an / asp / b / bant / biz / c / can / cgl / ck / cm / co / cock / d / diy / e / fa / fap / fit / fitlit / g / gd / gif / h / hc / his / hm / hr / i / ic / int / jp / k / lgbt / lit / m / mlp / mlpol / mo / mtv / mu / n / news / o / out / outsoc / p / po / pol / qa / qst / r / r9k / s / s4s / sci / soc / sp / spa / t / tg / toy / trash / trv / tv / u / v / vg / vint / vip / vp / vr / w / wg / wsg / wsr / x / y ] [Search | Free Show | Home]

DNS security

This is a blue board which means that it's for everybody (Safe For Work content only). If you see any adult content, please report it.

Thread replies: 14
Thread images: 1

This is a general DNS security thread for anyone willing to discuss, help newbies or learn more about DNS security in general.

Who among you are using DNSSEC[1][2] already? Why do you use it? What do you use it for? Have you considered TLSA (DANE[3]), SSHFP[4], OPENPGPKEY[5] resource records (RRs) yet?

Perhaps you don't like DNSSEC and instead use DNSCrypt[6] or DNSCurve[7] for encryption of your queries?

Share your thoughts!

Newbies section:
Here are some very basic, newbie friendly, introductory DNSSEC videos:
https://www.youtube.com/watch?v=lTABuMxO2AM
https://www.youtube.com/watch?v=qlto6GfZEvA

DNSSEC uses asymmetric cryptography[8] to securely sign all resource record sets (RRsets) on all authoritative name servers that support DNSSEC. Your local DNSSEC enabled resolver then validates the authenticity of your DNS queries to make sure your query has not been tampered with. This thwarts attacks trying to, for example, redirect you to malicious and compromised servers instead.

If you're thinking about registering your own domain, check if your registrar offers DNSSEC. Some registrars automatically sign your zone, which means you most likely can already add your TLSA RRs and such. Other registrars offer to upload your Delegation Signer (DS) RR, or your public zone signing key (ZSK) / public key signing key (KSK) instead. That's also nice if you wish to just host your own authoritative name server.

[1] https://tools.ietf.org/html/rfc4033
[2] http://www.dnssec.net/
[3] https://tools.ietf.org/html/rfc6698
[4] https://tools.ietf.org/html/rfc4255
[5] https://tools.ietf.org/html/rfc7929
[6] https://www.dnscrypt.org/
[7] https://dnscurve.org/
[8] https://en.wikipedia.org/wiki/Public-key_cryptography
>>
I just got all my domains DNSSEC signed, DS records etc.

The .tech TLD had a bug only allowing one DS record. After about a week of a ticket with my registrar (they opened a separate upstream ticket to the .tech registry) - it was fixed.

Your image is of the DNSViz service - it was invaluable to troubleshooting my issues as I tried to get everything configured properly.
>>
I thought DNSCrypt and DNSSEC were different things but maybe I'm wrong
>>
>>60613549
They are.
>>
>>60613509
DNSViz is a super helpful tool, indeed. Why would you need multiple DS RRs in your parent domain for your own domain, though?
>>
So, I'm a chump who owns a couple of computers and an RPi. What should I know about DNS security?
It seems like a topic for server managers.
>>
>>60614220
Depends. Are you hosting anything accessible from the Internet, for example?
>>
>>60614270
Not really hosting, but I'm planning on making the RPi remotely accesible from the internet.
SSH mostly.
>>
>>60614327
Then you might at least benefit from DNSSEC by adding your SSHFP RRs to your DNSSEC secured zone. Then next configure your SSH clients to check the server's fingerprints with the SSHFP RRs in your DNS zone for each time you connect. This can make sure someone else isn't redirecting you to a rogue server. Otherwise there's a slight (by design) Trust On First Use (TOFU[1]) weakness, meaning that you have to make sure the fingerprint you're presented with truly matches your server's fingerprint when connecting with the client for the first time.

Apart from that, you might also benefit in general form a DNSSEC enabled resolver (Unbound[2], for example) for all the queries you send out when connecting to other websites. Many website (but not nearly enough yet) secure their domains with DNSSEC so that you can be sure you're connecting to the right servers. So it's not just for server managers; everyone can benefit.

[1] https://en.wikipedia.org/wiki/Trust_on_first_use
[2] https://unbound.net/
>>
>>60614127

Following the guidance in:

https://tools.ietf.org/html/rfc4509

Essentially one DS of SHA1 and one of SHA256.
>>
>>60614700
I still don't get why you'd need multiple, since you should at most deploy one. Deploying two DS RRs, one SHA-1 and one SHA-256 feels like a transitional hack to support resolvers that can't handle SHA-256 yet, which is weird enough to begin with. Moreover, SHA-1 is considered unsecure since practical attacks[1] are possible. Use SHA-256 or higher wherever possible now.

[1] https://shattered.io/
>>
>>60614327
VPN server, don't make SSH internet-facing
>>
>>60615035

You're right, this is essentially legacy guidance at this point (SHA1).

Can I simply remove the SHA1 DS record from the registrar ? (I.e. nothing to be done with ZSK/KSK ?)

I tried this on a test domain, and validating caches, DNSViz etc all say it's a-ok. The 'getds' command line tool from dnssec-tools does bitch about it though saying there is a missing DS record.
>>
>>60615514
As long as you have a valid SHA-256 DS RR (digest of your current KSK/ZSK) in your parent domain, DNSSEC will work as intended.

I'm not sure about the error you're getting from dnssec-tools, but if DNSViz says it's OK, and you can verify it yourself with your own DNSSEC resolver (e.g. Unbound with the trusted root anchor) you're perfectly fine.
Thread posts: 14
Thread images: 1


[Boards: 3 / a / aco / adv / an / asp / b / bant / biz / c / can / cgl / ck / cm / co / cock / d / diy / e / fa / fap / fit / fitlit / g / gd / gif / h / hc / his / hm / hr / i / ic / int / jp / k / lgbt / lit / m / mlp / mlpol / mo / mtv / mu / n / news / o / out / outsoc / p / po / pol / qa / qst / r / r9k / s / s4s / sci / soc / sp / spa / t / tg / toy / trash / trv / tv / u / v / vg / vint / vip / vp / vr / w / wg / wsg / wsr / x / y] [Search | Top | Home]

I'm aware that Imgur.com will stop allowing adult images since 15th of May. I'm taking actions to backup as much data as possible.
Read more on this topic here - https://archived.moe/talk/thread/1694/


If you need a post removed click on it's [Report] button and follow the instruction.
DMCA Content Takedown via dmca.com
All images are hosted on imgur.com.
If you like this website please support us by donating with Bitcoins at 16mKtbZiwW52BLkibtCr8jUg2KVUMTxVQ5
All trademarks and copyrights on this page are owned by their respective parties.
Images uploaded are the responsibility of the Poster. Comments are owned by the Poster.
This is a 4chan archive - all of the content originated from that site.
This means that RandomArchive shows their content, archived.
If you need information for a Poster - contact them.